Ransomware attackers specifically target and attempt to destroy backup systems to increase the probability of payment. Hardening your system is critical. Please ensure you have reviewed your platform security using the Security Hardening Checklist.
Once you have registered a source in Cohesity DataProtect as a Service, you can start protecting the objects, volumes, and files in that source. For detailed instructions, see the respective Workload Types: